Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes.
Which type of attack can she implement in order to continue?
a307962
4 months, 2 weeks agoinsaniunt
11 months agoIPconfig
1 year agoVincent_Lu
1 year, 4 months agovictorfs
1 year, 6 months agojeremy13
1 year, 6 months agoeli117
1 year, 7 months ago